<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Caddy-Defender (&lt; 0.10.1) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/caddy-defender--0.10.1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 20:31:38 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/caddy-defender--0.10.1/feed.xml" rel="self" type="application/rss+xml"/><item><title>Caddy Defender Client IP Bypass Vulnerability (CVE-2026-46415)</title><link>https://feed.craftedsignal.io/briefs/2026-05-caddy-defender-bypass/</link><pubDate>Tue, 19 May 2026 20:31:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-caddy-defender-bypass/</guid><description>Caddy Defender versions before v0.10.1 are vulnerable to a client IP bypass (CVE-2026-46415) when deployed behind a trusted proxy, allowing blocked clients to bypass Defender's IP-based restrictions.</description><content:encoded><![CDATA[<p>Caddy Defender, a middleware for the Caddy web server, is susceptible to a client IP address bypass vulnerability, identified as CVE-2026-46415, in versions prior to v0.10.1. This flaw arises when Caddy Defender is deployed behind a trusted proxy, CDN, or load balancer. The issue stems from Defender&rsquo;s reliance on <code>r.RemoteAddr</code> for evaluating request blocking, which reflects the IP address of the immediate peer (the proxy) rather than the originating client. Consequently, clients within blocked IP ranges can circumvent Defender&rsquo;s intended restrictions by routing their traffic through a trusted proxy whose IP address is not blocked. Organizations using Caddy Defender behind trusted proxies to enforce IP-based access control are particularly vulnerable.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A client with a blocked IP address attempts to access a protected resource.</li>
<li>The client&rsquo;s traffic is routed through a trusted proxy, CDN, or load balancer.</li>
<li>The trusted proxy forwards the request to the Caddy web server.</li>
<li>Caddy Defender receives the request and evaluates the IP address for blocking.</li>
<li>Defender incorrectly uses <code>r.RemoteAddr</code>, which reflects the trusted proxy&rsquo;s IP address, not the client&rsquo;s.</li>
<li>Since the proxy&rsquo;s IP is not blocked, Defender allows the request to proceed.</li>
<li>The client successfully accesses the protected resource, bypassing the intended IP-based restriction.</li>
<li>The attacker gains unauthorized access to sensitive information or performs actions they should be restricted from.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-46415) enables unauthorized access to protected resources by clients that should be blocked based on their IP address. This bypass can lead to data breaches, service disruption, or other malicious activities, depending on the resources protected by Caddy Defender. The severity is high because it directly undermines the intended security functionality of Caddy Defender when deployed behind trusted proxies.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Caddy Defender to version v0.10.1 or later to remediate the CVE-2026-46415 vulnerability, as mentioned in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect Caddy Defender IP Bypass Attempt&rdquo; to identify potential exploitation attempts by monitoring for requests originating from known blocked IP ranges based on web server logs.</li>
<li>Until upgrading, enforce equivalent IP blocking at the trusted proxy, CDN, load balancer, or firewall layer as a workaround, as suggested in the advisory.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>defender</category><category>proxy</category><category>bypass</category><category>ghsa</category></item></channel></rss>